About Adam K Levin | Contact | Videos

Cybersecurity

Cybersecurity columns and articles written and featured by Swiped author Adam K Levin


SHIELD act

New York AG Proposes Tougher Data Breach Laws

Share

Even though we haven’t passed the green flags of Thanksgiving, it’s beginning to look a lot like Christmas—at least for cybersecurity advocates. In this edition of “Someone’s Actually Paying attention,” New York State Attorney General Eric Schneiderman has introduced a bill that expands the definition of a breach in his state. The bill is called the Stop Hacks and Improve Electronic Security Act, or the SHIELD Act for short, and it already has the support […]

  • How Social Media Could Kill Your CompanyCybersecurity, Identity Theft

    Share

    Who are you? These days it depends on a number of factors, all of which a criminal can easily spoof. Where you are matters, both in terms of your geographic location and the kinds of personal information you place online. Ten years ago, many consumers would have shuddered at the idea of putting personal and career information where anyone could see it, much less preferences and opinions. Now it’s commonplace. The Internet being what it is – a decentralized network […]

  • Consumers clamor for free credit freezes in wake of Equifax breachcredit, Cybersecurity, Identity Theft

    Share

    Victims of the Equifax data hack, please sit tight. I’d hate to see people paying money for the wrong thing. That’s already happening to people like, John, in Texas, who ended up regretting his purchase of a $19.95 credit monitoring subscription. Also, I think eventually the right thing is going to happen and consumers will be able to freeze their credit reports—for free. There is, finally, momentum in that direction. If you are sure you don’t need […]

  • The Equifax Breach and the Cybersecurity Silver BulletData Security, Cybersecurity, Technology

    Share

    Some time ago, the popular show Mythbusters wanted to find out if the Lone Ranger was right about silver bullets being better than lead ones. Turns out silver bullets are actually slower and less accurate. When it comes to cybersecurity, quick-fix silver bullets are also less effective than tried-and-true approaches. The most effective cybersecurity strategies begin with two certainties: mistakes will be made, and breaches like the one that hit Equifax will keep happening. The 143 million consumers exposed […]

  • Equifax hack

    Your Equifax Download: What You Need to Know about the Equifax Hackcredit, Swiped, Cybersecurity

    Share

    Everyone knows a mosquito bite doesn’t really start itching until the damage has already been done, and the same goes for many kinds of identity-related crimes. With news of the recent Equifax breach continuing to surface, what do you need to know now to limit your exposure? Equifax has estimated the hack impacts 143 million people, mostly in the United States. (That’s almost half the US population!) The thieves stole names, Social Security numbers, birth […]

  • Machine learning

    As Data Multiplies, Technology Helps Tackle More Challenging Security IssuesData Security, Cybersecurity

    Share

    IT systems have never been more powerful or accessible to businesses. However, the scope and scale of cyber crimes continues to outpace tech innovation. For years, the challenge for internal IT and security teams has been to use existing company data to construct an integrated picture of oddities and unexpected actions on their network. Recent advancements in machine learning and behavior or anomaly-based analytics that leverage existing enterprise logs have provided security teams with much more accurate intelligence […]

  • IoT

    As use of IoT devices explodes, detecting vulnerabilities becomes nascent industryCybersecurity

    Share

    The number of machine-to-machine connected devices—the Internet of Things—is growing faster than the world population. Cisco estimates that M2M connections will grow from 4.9 billion in 2015 to 12.8 billion by 2020 (estimated world population in 2020: 7.7 billion). Growth in IoT security expenditures is as robust. Gartner puts endpoint IoT security spending at $1,183 billion in 2015, and estimates $3,010 billion in 2020. “Everybody’s realizing that IoT security is a serious problem,” says Xu Zou, CEO […]

  • Ransomware

    Why The Ransomware Plague Is Only Warming UpData Security, Cybersecurity

    Share

    Ransomware continues to pose a potent threat to individuals and, increasingly, to companies. What’s worse, all signs point to ransomware attacks escalating the rest of this year and into 2017. How bad is it? Arctic Wolf Networks has measured a 433 percent spike in ransomware attacks over the past year, and the FBI says victims paid up $209 million in the first quarter of 2016, up from $24 million in all of 2015. And that only […]

  • Cyberthieves

    New tools automate cyber criminals’ attempts to take over corporate accountsData Security, Cybersecurity

    Share

    Nearly all of the largest organizations throughout the world had their credentials exposed by cyber criminals last year, a new study has found. The study, done by London- and San Francisco-based Digital Shadows, which provides clients with information about their external digital risks, determined that 97 percent of the world’s largest 1,000 organizations had credentials exposed. The credentials are valuable to cyber criminals who “are increasingly turning to credential stuffing tools,” Digital Shadows officials say, […]

  • Cyber defense

    Are You Hack-Proof? Here’s How to Make SureSwiped, Cybersecurity, Technology

    Share

    While the writing has been on the wall for a long time, last Friday it was in the news wires when a new strain of ransomware called WannaCrypt raged like an out-of-control wildfire across Europe and Asia, ultimately impacting computers in 150 countries. For many affected by this hack, a few hundred dollars in ransom money is a pittance when compared to the cost of hiring someone to attempt the recovery of your files after […]

LOAD MORE ARTICLES